• Main Menu
  • Privacy

    • How to Fake Mail

      How to Fake Mail

      Fake mail is e-mail which appears to be from someone other than the actual sender. Fake mail was initially usually used to stage practical jokes, but is now utilized primarily by e-mail spammers. How to Send Fake Mail To send fake mail, first `telnet` to port 25 of the machine you want the fake mail

    • How to Remove all Personal Files from Windows

      How to Remove all Personal Files from Windows

      Over the last decade, millions of people have kept more and more personal information on their computers. From credit card numbers to sensitive emails and word documents, a vast amount of personal files are on almost any home computer. While keeping personal and sensitive information on a home computer is relatively safe, if you plan

    • Technologies That Can Help Protect Your Privacy

      Technologies That Can Help Protect Your Privacy

      In a previous article on privacy we’ve established what it is, how does digitally networking our world affect it, and in a nutshell, why should we care. We established that the best way to ensure your privacy is through technological means, and in this article I offer an overview of what such technologies are. What

    • Browser Cookie

      Browser Cookie

      A browser cookie is a small piece of information sent by a web server to a web browser to be stored for future use. The data in the browser cookie will be sent back to the web server whenever the browser reconnects to the web site. Cookies are commonly used to store user preference information,

    169 queries in 0.442 seconds.